From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Influence maximization in the presence of vulnerable nodes: A ratio perspective., , , и . Theor. Comput. Sci., (2021)Reverse-Safe Text Indexing., , , , и . ACM J. Exp. Algorithmics, (2021)Clustering sequence graphs., , и . Data Knowl. Eng., (2022)Pattern Masking for Dictionary Matching., , , , , , и . ISAAC, том 212 из LIPIcs, стр. 65:1-65:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Making de Bruijn Graphs Eulerian., , , , , и . CPM, том 223 из LIPIcs, стр. 12:1-12:18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Bidirectional String Anchors: A New String Sampling Mechanism., и . ESA, том 204 из LIPIcs, стр. 64:1-64:21. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Space-Efficient Indexes for Uncertain Strings., , , , и . CoRR, (2024)Limiting the Influence to Vulnerable Users in Social Networks: A Ratio Perspective., , , и . AINA, том 926 из Advances in Intelligent Systems and Computing, стр. 1106-1122. Springer, (2019)Location histogram privacy by sensitive location hiding and target histogram avoidance/resemblance (extended version)., и . CoRR, (2019)Differentially Private Top-k Selection via Canonical Lipschitz Mechanism., и . CoRR, (2022)